Understanding Tokenization Security (Part 1)